Analysis
-
max time kernel
53s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/02/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe
Resource
win10-20220812-en
General
-
Target
1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe
-
Size
329KB
-
MD5
250cd5123a7ca108bf45d681c33b4602
-
SHA1
37a7333034268de06720f5f04756d2fe0ac8efd8
-
SHA256
1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3
-
SHA512
9488b3b65a2dc00542f4783f99e7a206933a7930ef4414b810ca6895a79582da7fb58753ee81e153d136a2021c3dafc86ece2cfab0c4331c87ce6c0c92832afe
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4552 oobeldr.exe 3240 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4940 set thread context of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4552 set thread context of 3240 4552 oobeldr.exe 71 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe 5092 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 4940 wrote to memory of 1352 4940 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 67 PID 1352 wrote to memory of 5092 1352 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 68 PID 1352 wrote to memory of 5092 1352 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 68 PID 1352 wrote to memory of 5092 1352 1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe 68 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 4552 wrote to memory of 3240 4552 oobeldr.exe 71 PID 3240 wrote to memory of 4764 3240 oobeldr.exe 72 PID 3240 wrote to memory of 4764 3240 oobeldr.exe 72 PID 3240 wrote to memory of 4764 3240 oobeldr.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe"C:\Users\Admin\AppData\Local\Temp\1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exeC:\Users\Admin\AppData\Local\Temp\1b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:5092
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD5250cd5123a7ca108bf45d681c33b4602
SHA137a7333034268de06720f5f04756d2fe0ac8efd8
SHA2561b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3
SHA5129488b3b65a2dc00542f4783f99e7a206933a7930ef4414b810ca6895a79582da7fb58753ee81e153d136a2021c3dafc86ece2cfab0c4331c87ce6c0c92832afe
-
Filesize
329KB
MD5250cd5123a7ca108bf45d681c33b4602
SHA137a7333034268de06720f5f04756d2fe0ac8efd8
SHA2561b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3
SHA5129488b3b65a2dc00542f4783f99e7a206933a7930ef4414b810ca6895a79582da7fb58753ee81e153d136a2021c3dafc86ece2cfab0c4331c87ce6c0c92832afe
-
Filesize
329KB
MD5250cd5123a7ca108bf45d681c33b4602
SHA137a7333034268de06720f5f04756d2fe0ac8efd8
SHA2561b623f37472a7f52ff1157f2560a90a7ece490070f1e79a359b94bcf6496acf3
SHA5129488b3b65a2dc00542f4783f99e7a206933a7930ef4414b810ca6895a79582da7fb58753ee81e153d136a2021c3dafc86ece2cfab0c4331c87ce6c0c92832afe